Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:19444
HistoryMay 16, 2019 - 3:10 a.m.

Authentication Bypass

2019-05-1603:10:37
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
5

0.002 Low

EPSS

Percentile

56.0%

cephx protocol is vulnerable to authentication bypass attacks. This is because the way signature calculation was handled by cephx authentication protocol. An attacker who has access to ceph cluster network is able to alter the message payload which leads to bypass signature checks done by cephx protocol.

References